A secure and robust scheme for sharing confidential information in IoT systems L Bu, M Isakov, MA Kinsy Ad Hoc Networks 92, 101762, 2019 | 14 | 2019 |
Design of reliable and secure devices realizing Shamir's secret sharing Z Wang, M Karpovsky, L Bu IEEE Transactions on Computers 65 (8), 2443-2455, 2015 | 13 | 2015 |
Bulwark: Securing implantable medical devices communication channels L Bu, MG Karpovsky, MA Kinsy Computers & Security 86, 498-511, 2019 | 6 | 2019 |
Open-source fpga implementation of post-quantum cryptographic hardware primitives R Agrawal, L Bu, A Ehret, M Kinsy 2019 29th International Conference on Field Programmable Logic and …, 2019 | 5 | 2019 |
A Design of Secure and ReliableWireless Transmission Channel for Implantable Medical Devices. L Bu, MG Karpovsky ICISSP, 233-242, 2017 | 5 | 2017 |
SRASA: A generalized theoretical framework for security and reliability analysis in computing systems L Bu, J Dofe, Q Yu, MA Kinsy Journal of Hardware and Systems Security 3 (3), 200-218, 2019 | 4 | 2019 |
Preventing neural network model exfiltration in machine learning hardware accelerators M Isakov, L Bu, H Cheng, MA Kinsy 2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 62-67, 2018 | 4 | 2018 |
RASSS: a perfidy-aware protocol for designing trustworthy distributed systems L Bu, HD Nguyen, MA Kinsy 2017 IEEE International Symposium on Defect and Fault Tolerance in VLSI and …, 2017 | 4 | 2017 |
A hybrid self-diagnosis mechanism with defective nodes locating and attack detection for parallel computing systems L Bu, M Karpovsky 2016 IEEE 22nd International Symposium on On-Line Testing and Robust System …, 2016 | 4 | 2016 |
New byte error correcting codes with simple decoding for reliable cache design L Bu, M Karpovsky, Z Wang 2015 IEEE 21st International On-Line Testing Symposium (IOLTS), 200-205, 2015 | 4 | 2015 |
Fast arithmetic hardware library for rlwe-based homomorphic encryption R Agrawal, L Bu, A Ehret, MA Kinsy arXiv preprint arXiv:2007.01648, 2020 | 3 | 2020 |
Designing secure heterogeneous multicore systems from untrusted components MA Kinsy, L Bu, M Isakov, M Mark Cryptography 2 (3), 12, 2018 | 3 | 2018 |
A short survey at the intersection of reliability and security in processor architecture designs L Bu, M Mark, MA Kinsy 2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 118-123, 2018 | 3 | 2018 |
A post-quantum secure discrete gaussian noise sampler R Agrawal, L Bu, MA Kinsy 2020 IEEE International Symposium on Hardware Oriented Security and Trust …, 2020 | 2 | 2020 |
Design-flow methodology for secure group anonymous authentication R Agrawal, L Bu, E Del Rosario, MA Kinsy 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2020 | 2 | 2020 |
Post-quantum cryptographic hardware primitives L Bu, R Agrawal, H Cheng, MA Kinsy arXiv preprint arXiv:1903.03735, 2019 | 2 | 2019 |
Fast dynamic device authentication based on lorenz chaotic systems L Bu, H Cheng, MA Kinsy 2018 IEEE International Symposium on Defect and Fault Tolerance in VLSI and …, 2018 | 2 | 2018 |
Weighted group decision making using multi-identity physical unclonable functions L Bu, M Kinsy 2018 28th International Conference on Field Programmable Logic and …, 2018 | 2 | 2018 |
Adaptive and dynamic device authentication based on lorenz chaotic systems L Bu, H Cheng, MA Kinsy 61st International Midwest Symposium on Circuits and Systems (MWSCAS), 2018 | 2 | 2018 |
Hardening AES Hardware Implementations Against Fault and Error Inject Attacks L Bu, MA Kinsy Proceedings of the 2018 on Great Lakes Symposium on VLSI, 499-502, 2018 | 2 | 2018 |